Data protection in cloud computing: A Survey of the State-of-Art

Abstract A favorable development of the public cloud infrastructure requires data protection which provides the assurance with the well implement of the infrastructure as supposed, both for the cloud user as well as the cloud provider. Still, data protection is not so far presented with the appropriate attention. In this paper, we have introduced the possible risks that data can experience throughout cloud transfer and also recovery. Hence, we introduced various known attacks and subsequently discussed the advantages as well as the disadvantages of the diverse techniques suggested in the literature for restraining the effects of these last ones.

[1]  George Kesidis,et al.  On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants , 2015, 2015 IEEE 23rd International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[2]  Khalil Al-Shqeerat,et al.  Cloud Computing Security Challenges in Higher Educational Institutions - A Survey , 2017 .

[3]  Arif Sari,et al.  A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .

[4]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[5]  Christoph Meinel,et al.  Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[6]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[7]  Michael K. Reiter,et al.  Cross-Tenant Side-Channel Attacks in PaaS Clouds , 2014, CCS.